© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 1 1 © 2013 Cisco and/or its affiliates. All rights reserved. Evaluation Process.

Slides:



Advertisements
Similar presentations
1 Effective, secure and reliable hosted security and continuity solution.
Advertisements

SIEM Based Intrusion Detection Jim Beechey May 2010 GSEC, GCIA, GCIH, GCFA, GCWN twitter: jim_beechey.
Next Generation Endpoint Security Jason Brown Enterprise Solution Architect McAfee May 23, 2013.
AVG Internet Security 7.5 Product presentation.
©2014 Bit9. All Rights Reserved Building a Continuous Response Architecture.
What’s New in BMC ProactiveNet 9.5?
© 2015 Cisco and/or its affiliates. All rights reserved. 1 The Importance of Threat-Centric Security William Young Security Solutions Architect It’s Our.
Unified Logs and Reporting for Hybrid Centralized Management
NetFlow Analyzer Drilldown to the root-QoS Product Overview.
Lesson 19: Configuring Windows Firewall
IBM Security Network Protection (XGS)
© 2012 IBM Corporation IBM Security Systems 1 © 2014 IBM Corporation IBM Security Network Protection (XGS) Advanced Threat Protection Integration Framework.
MCTS Guide to Microsoft Windows Server 2008 Network Infrastructure Configuration Chapter 11 Managing and Monitoring a Windows Server 2008 Network.
Barracuda Web Filter Overview March 26, 2008 Alan Pearson, Monroe County School District Marcus Burge, Network Engineer.
Department Of Computer Engineering
INTRUSION DETECTION SYSTEMS Tristan Walters Rayce West.
Presented by INTRUSION DETECTION SYSYTEM. CONTENT Basically this presentation contains, What is TripWire? How does TripWire work? Where is TripWire used?
© 2012 Cisco and/or its affiliates. All rights reserved. 1 CCNA Security 1.1 Instructional Resource Chapter 10 – Implementing the Cisco Adaptive Security.
Skybox® Security Solutions for Symantec CCS Comprehensive IT Governance Risk and Access Compliance Management Skybox Security's.
©2003–2008 Check Point Software Technologies Ltd. All rights reserved. CheckPoint new security architecture and R70 highlights.
Net Optics Confidential and Proprietary Net Optics appTap Intelligent Access and Monitoring Architecture Solutions.
COEN 252 Computer Forensics
CSI-E Computer Security Investigator – Enterprise.
COEN 252 Computer Forensics Collecting Network-based Evidence.
Honeypot and Intrusion Detection System
Vantage Report 3.0 Product Sales Guide
OV Copyright © 2013 Logical Operations, Inc. All rights reserved. Network Security  Network Perimeter Security  Intrusion Detection and Prevention.
Windows 7 Firewall.
OV Copyright © 2011 Element K Content LLC. All rights reserved. Network Security  Network Perimeter Security  Intrusion Detection and Prevention.
Pre-Release Information Aug 17, 2009 Trend Micro Web Gateway Security InterScan Web Security Virtual Appliance v5 Advanced Reporting and Management v1.
Computer Emergency Notification System (CENS)
1 © 2001, Cisco Systems, Inc. All rights reserved. Cisco Info Center for Security Monitoring.
What’s New in WatchGuard XCS v9.1 Update 1. WatchGuard XCS v9.1 Update 1  Enhancements that improve ease of use New Dashboard items  Mail Summary >
Chapter 5: Implementing Intrusion Prevention
© 2006 Cisco Systems, Inc. All rights reserved. Cisco IOS Threat Defense Features.
© 2006 Cisco Systems, Inc. All rights reserved. Implementing Secure Converged Wide Area Networks (ISCW) Module 6: Cisco IOS Threat Defense Features.
Network security Product Group 2 McAfee Network Security Platform.
ISA Server 2004 Introduction Владимир Александров MCT, MCSE, MCSD, MCDBA Корус, Управител
INTRUSION DETECTION SYSYTEM. CONTENT Basically this presentation contains, What is TripWire? How does TripWire work? Where is TripWire used? Tripwire.
How to Deploy and Configure the Smart Net Total Care CSPC Collector
Marin Frankovic Datacenter TSP
Synchronized Security Revolutionizing Advanced Threat Protection
Rob Davidson, Partner Technology Specialist Microsoft Management Servers: Using management to stay secure.
Sky Advanced Threat Prevention
Module 10: Windows Firewall and Caching Fundamentals.
Connected Security Your best defense against advanced threats Anne Aarness – Intel Security.
Cisco Confidential © 2010 Cisco and/or its affiliates. All rights reserved. 1 Security Management Update.
BUFFERZONE Advanced Endpoint Security Data Connectors-Charlotte January 2016 Company Confidential.
Boris Ulík Technology Solutions Professional Microsoft Slovakia Microsoft ® System Center 2012: System Center Endpoint Protection 2012.
ECAT 4.1 – Rule Your Endpoints What’s New Customer Overview.
Enterprise’ Ever-Evolving Challenge & Constraints Dealing with BYOD Challenges Enable Compliance to Regulations Stay Current with New Consumption Models.
Unit 2 Personal Cyber Security and Social Engineering Part 2.
SMOOTHWALL FIREWALL By Nitheish Kumarr. INTRODUCTION  Smooth wall Express is a Linux based firewall produced by the Smooth wall Open Source Project Team.
Secure Access and Mobility Jason Kunst, Technical Marketing Engineer March 2016 Location Based Services with Mobility Services Engine ISE Location Services.
Get Full Protection on Microsoft Azure with Symantec™ Endpoint Protection 12.1 MICROSOFT AZURE ISV PROFILE: SYMANTEC Symantec™ Endpoint Protection is an.
Microsoft Ignite /1/ :41 PM BRK3249
Advanced Endpoint Security Data Connectors-Charlotte January 2016
IoT Security Part 2, The Malware
C IBM Security QRadar SIEM V7.2.6 Associate Analyst
100% Exam Passing Guarantee & Money Back Assurance
Click to edit Master subtitle style
Firewall – Survey Purpose of a Firewall Characteristic of a firewall
Firewalls at UNM 11/8/2018 Chad VanPelt Sean Taylor.
Securely run and grow your business with Microsoft 365 Business
Sizing …today. T: Here’s how. .
11/17/2018 9:32 PM © Microsoft Corporation. All rights reserved. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN.
12/1/ :04 AM © Microsoft Corporation. All rights reserved. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN.
Secure once, run anywhere Simplify your security with Sophos
Chapter 10: Advanced Cisco Adaptive Security Appliance
AIR-T11 What We’ve Learned Building a Cyber Security Operation Center: du Case Study Tamer El Refaey Senior Director, Security Monitoring and Operations.
Presentation transcript:

© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 1 1 © 2013 Cisco and/or its affiliates. All rights reserved. Evaluation Process

Cisco Confidential 2 Evaluation Process 1. Develop Test Plan / Requirements List o IPS vs. IDS, app control, vulnerability testing, performance requirements, etc… 2. Scope of Appliances 3. Kick-Off Install 4. Weekly Reviews 5. Recap

© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 3 What Sourcefire Will Provide Dedicated Sales Engineer Appliances (sensors and management) Weekly Review of System Executive Reports Pricing for Production Devices Event Analysis

© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 4 What Customer Will Provide / Prep Network Diagram Rack space, cabling, & shelf or other place to stack the appliance (railkits are not always shipped with evals) available power (maximum of (4) power connections SPAN port identified, configured, and traffic verified IP addresses for management ports on each appliance Depending on the location of the components, firewall or other network configuration maybe required to allow sensors to connect to a Defense Center: Port 8305 is the default communications port for DC to Sensor communications Ports 443 and 22 are for communication directly with the DC or Sensors. NTP server address Unauthenticated Mail Relay address Identified InfoSec point of contact and/or Network team contact for install setup, addressing, etc if any network configs needed

© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 5 Evaluation Checklist Requirements Performance, application control, malware, inspection, API integration, custom rules, centralized management, etc… Testing environment Production or Lab General architecture Types of connections Integration with other technology Inline / Passive Testing tools Point of contact / groups involved Timeline

© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 6 Onsite Eval Kick-Off Meeting Review design, requirements and action plan Quick recap of dashboards, workflows, FireSIGHT context viewer, reports Installation Schedule weekly meetings / GMT for next 3-4 weeks to cover: o Reports, Events, Fine Tuning, Basic Configuration

© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 7 Recap Meeting General Feedback Overview of Methodology Demo of Configuration Key Findings; Events, Performance High Impact Threat Report Requirement Review Discuss Possible Purchase Timeline

8 8 Sample NGIPS Requirements List Management Platform Hierarchical management Management HA Data views and dashboard Customization Ease of deployment and ongoing administration Central management Ability to drill down during investigation Reporting Role-based management External authentication (RADIUS, LDAP, etc.) Fully searchable event database Ability to create and save custom searches Custom dashboards per user Full audit logging Automated updates Fully integrated reporting system Multiple report formats (PDF, CSV, HTML, etc.) Ability to see detailed performance information Multi-tennant management Packet Capture for ALL Events Contextual Awarenss and Security Automation Real-time Adaptive IPS (Based on RNA Host Profile) Automatic IPS Event Correction: Impact Analysis. Business Relevance, Risk Level, Application Automatic/Selfing Tuning Option Ability to fully automate tasks such as reports, updates, backups, etc. Ability to prioritize events based on relevance to protected environment Ability to automatically tune policy based on devices in protected environment Ability to identify devices (printers, routers, switches, etc.) Ability to identify operating systems Ability to identify applications Ability to identify services Ability to use externally generated flow data Ability to look for anomalous traffic patterns Ability to identify users Ability to detect anolmolous network device (compliance white list) Security Intelligence IP reputation / blacklists Detection of known C&C servers Geolocation IPS Industry validation (NSS Labs, Gartner, etc.) Threat detection Ability to see rule/filter/signature (open rules) Ability to edit existing rules Ability to create custom rules Packet capture Ability to download packet captures Ability to generate flow data Ability to inspect IPv6 traffic Ability to inspect traffic inline or out of band Application Control Features Ability to view a large range of applications Ability to control applications Ability to control sub-applications or specific application functionality Ability to control applications by user or group Ability to control applications by risk level Ability to control applications by business relevance Ability to define application groups Ability to maintain performance while performing application control Ability to control mobile devices / OS Click for full list

9 9 Sample Malware Requirements  Full list Full list Find root cause of infected machines Provide protection if an endpoint is out of the network Leverage the cloud for real-time analysis Protect against end-points and mobile devices including tablets and mobile phones Locate patient zero for a specific threat i.e when and who it was first installed or executed Retroactively provide details on who and when malware was downloaded and executed Provide file analysis (how many data points?) Include screen captures of the file when if was first seen to assis with educating end-users what to look for Remediate via custom detections i.e cloud-based SHA or original file Remediate via advanced custom i.e. Client-based, uses advanced techniques (e.g. offsets, wildcards, regular expressions) Remediate via Application blocking lists Remediate via Custom white lists Automatically creates simple custom detections Overview of Functionality Events & Indicators of Compromise - events, relationships between suspicious behaviors (e.g. Word or Java executing other files), etc etc etc etc etc File Trajectory - Patient Zero, when malware was first seen on which computer in your environment, its parentage, lineage, how it moves between hosts Device Trajectory - relationship of files and network traffic on a single computer. Parent-Child relatonships on a machine. Files spawning other files. JAVA.exe creating other files. File Analysis - Once you have the "unknown" file - you can run it through our sandbox to get screen shots, PCAPs, original sample, static analysis, running analysis of files dropped, URL connected to. Control - Simple and Advanced methods to control / clean-up. Setup & Config & Reporting etc - groups, policies etc etc

© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 10

© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 11 Bigger, Faster, Stronger Reports

12

13 Attack Risk Network Risk

14 Network Risk

15

© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 16 Better Together

Sample Items

18 Brief Recap  90 day graphs provided ▸ Can we get sample pcaps?  Current priority for traffic from outside coming in  External FW and Internal PCI segments ▸ Eval to focus on IDS  Other technologies include RSA Tripwwire, Secure ID token, syslog exports  10 Gig future options  Discussed latency concerns, requirements for dual power  Application control options  Cisco gear

19 Eval Items Provided  (1) 3D7120 Sensor  (1) DC1500 Management Server with FireSIGHT  AppControl license for additional visiblity

20 POV Items Needed Rack space, cabling, & shelf or other place to stack the appliance (railkits are not always shipped with evals) available power (maximum of (4) power connections SPAN port identified, configured, and traffic verified IP addresses for management ports on each appliance Depending on the location of the components, firewall or other network configuration maybe required to allow sensors to connect to a Defense Center: Port 8305 is the default communications port for DC to Sensor communications Ports 443 and 22 are for communication directly with the DC or Sensors. NTP server address Unauthenticated Mail Relay address Identified InfoSec point of contact and/or Network team contact for install setup, addressing, etc if any network configs needed